During an incident response, Aisha verified that a compromised hard drive requires examination by the forensics team.
First, she ensures that the hard drive is write protected, so the data on the disk can't be edited or erased.
Then, she calculates and records a cryptographic hash function of an image of the hard drive.
Remember that a hash function is an algorithm that produces a code that can't be decrypted.
Aisha is then instructed to transfer it to Colin in the forensics department.
Colin examines it and sends it off to Nav, another analyst.